An Efficient Hash-based RFID Grouping Authentication Protocol Providing Missing Tags Detection

Radio Frequency Identification (RFID) is a promising technology which can be applied in many areas, including supply chains logistics and medical treatment. Due to practical requirements of verifying multiple objects simultaneously, the authentication towards large numbers of RFID tags or tag groups remains a hot topic. However, because of the resource limitation of low-cost RFID tags, only basic cryptographic encryptions can be applied on the tag sides. As a result, security and privacy risks towards the RFID system remain crucial issues to be solved. Additionally, in some complex scenarios such as factory or harbor, some tags may be missing or temporarily disabled due to environmental interference. In this paper, an efficient hash-based RFID grouping authentication protocol providing missing tags detection is proposed. In our assumption, each reader of the authentication system can verify large amounts of RFID tags within its ranges. Note that it is not necessary for the reader to predefine the tags into groups during large-scale authentication. Instead, the RFID system can automatically divide the tags into different groups according to the given slots and bitmap. Moreover, the proposed protocol can detect and reset the missing tags so that the missing tag can rejoin the system. Security analysis shows that this protocol can offer sufficient security assurances and resist various attacks. Subsequently, the performance analysis illustrates that the proposed protocol yields better performance than the state-of-the-art RFID grouping authentication protocols.

[2]  Elyes Ben Hamida,et al.  Behavior of wireless body-to-body networks routing strategies for public protection and disaster relief , 2015, 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[3]  Yu-Jung Huang,et al.  Efficient Implementation of RFID Mutual Authentication Protocol , 2012, IEEE Transactions on Industrial Electronics.

[4]  Victor C. M. Leung,et al.  An Authenticated Trust and Reputation Calculation , 2017 .

[5]  Jian Shen,et al.  An Enhanced Grouping Proof for Multiple RFID Readers and Tag Groups , 2014 .

[6]  Jung-Hui Chiu,et al.  Reading order independent grouping proof for RFID tags , 2008, 2008 IEEE International Conference on Intelligence and Security Informatics.

[7]  Said Rakrak,et al.  From RFID tag ID to IPv6 address mapping mechanism , 2015, 2015 Third International Workshop on RFID And Adaptive Wireless Sensor Networks (RAWSN).

[8]  Shigeng Zhang,et al.  Unknown Tag Identification in Large RFID Systems: An Efficient and Complete Solution , 2015, IEEE Transactions on Parallel and Distributed Systems.

[9]  Chih-Chung Lin,et al.  Coexistence Proof Using Chain of Timestamps for Multiple RFID Tags , 2007, APWeb/WAIM Workshops.

[10]  Luca Catarinucci,et al.  Improved Battery-Less Augmented RFID Tag: Application on Ambient Sensing and Control , 2016, IEEE Sensors Journal.

[11]  Noël Crespi,et al.  Smart cross-layer protocol integration for efficient wireless communications , 2015, Int. J. Ad Hoc Ubiquitous Comput..

[12]  Zhiguang Qin,et al.  Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks , 2015, IEEE Transactions on Information Forensics and Security.

[13]  Zhi Chen,et al.  Cooperative spectrum sensing based on side information for cognitive radio sensor networks in internet of things applications , 2016, Int. J. Internet Protoc. Technol..

[14]  Kyung Sup Kwak,et al.  On maximising tag reading efficiency of a multi-packet reception capable radio frequency identification reader , 2015, IET Commun..

[15]  Tzong-Chen Wu,et al.  Ownership transfer protocol for RFID objects using lightweight computing operators , 2011, 2011 International Conference for Internet Technology and Secured Transactions.

[16]  Djamel Djenouri,et al.  Car park management with networked wireless sensors and active RFID , 2015, 2015 IEEE International Conference on Electro/Information Technology (EIT).

[17]  Min Chen,et al.  An Efficient Anonymous Authentication Protocol for RFID Systems Using Dynamic Tokens , 2015, 2015 IEEE 35th International Conference on Distributed Computing Systems.

[18]  Da-Zhi Sun,et al.  A hash-based RFID security protocol for strong privacy protection , 2012, IEEE Transactions on Consumer Electronics.

[19]  Yunhao Liu,et al.  Cardinality Estimation for Large-Scale RFID Systems , 2011, IEEE Trans. Parallel Distributed Syst..

[20]  Ge Yu,et al.  A Simulation Platform for RFID Application Deployment Supporting Multiple Scenarios , 2012, 2012 Eighth International Conference on Computational Intelligence and Security.

[21]  Hung-Yu Chien,et al.  Tree-Based RFID Yoking Proof , 2009, 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing.

[22]  Hossam S. Hassanein,et al.  Tag Modulation Silencing: Design and Application in RFID Anti-Collision Protocols , 2014, IEEE Transactions on Communications.

[23]  Selwyn Piramuthu,et al.  On Existence Proofs for Multiple RFID Tags , 2006, 2006 ACS/IEEE International Conference on Pervasive Services.

[24]  Madhumita Kathuria,et al.  Reliable delay sensitive loss recovery protocol for critical health data transmission system , 2015, 2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE).

[25]  Prosanta Gope,et al.  A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks , 2016, IEEE Transactions on Industrial Electronics.

[26]  Lihua Ruan,et al.  SmartBAN With Periodic Monitoring Traffic: A Performance Study on Low Delay and High Energy Efficiency , 2018, IEEE Journal of Biomedical and Health Informatics.

[27]  Leonid Bolotnyy,et al.  Generalized "Yoking-Proofs" for a Group of RFID Tags , 2006, 2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services.

[28]  Laurence T. Yang,et al.  Grouping-Proofs-Based Authentication Protocol for Distributed RFID Systems , 2013, IEEE Transactions on Parallel and Distributed Systems.

[29]  Jian Shen,et al.  An Efficient RFID Authentication Protocol Providing Strong Privacy and Security , 2016 .

[30]  Ari Juels,et al.  "Yoking-proofs" for RFID tags , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.

[31]  Jian Shen,et al.  A lightweight and practical RFID grouping authentication protocol in multiple-tag arrangements , 2015, 2015 17th International Conference on Advanced Communication Technology (ICACT).

[32]  Weidong Wang,et al.  Code division cooperative identification reader anti-collision protocol in smart RFID systems , 2012, 2012 19th International Conference on Telecommunications (ICT).

[33]  Abbas Jamalipour,et al.  A Probabilistic Energy-Aware Routing Protocol for Wireless Body Area Networks , 2014, 2014 IEEE 80th Vehicular Technology Conference (VTC2014-Fall).

[34]  N. S. Hoang,et al.  A Low-Cost , 1997 .

[35]  H. T. Mouftah,et al.  Authentication mechanism for mobile RFID based Smart grid network , 2014, 2014 IEEE 27th Canadian Conference on Electrical and Computer Engineering (CCECE).

[36]  Kouichi Sakurai,et al.  Grouping proof for RFID tags , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[37]  Jian Shen,et al.  A Novel Routing Protocol Providing Good Transmission Reliability in Underwater Sensor Networks , 2015 .

[38]  Riqing Chen,et al.  RFID-based stent-graft dynamic assessment for health cares , 2017, IET Networks.

[39]  Ari Juels,et al.  RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.